Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack
نویسندگان
چکیده
In this paper, we present a model developed for Electric Power Management Systems (EPMS) and Supervisory Control and Data Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation operators and administrators identify and harden those portions of the control system that are most vulnerable to cyber attack. We use graph theory to model electric power control and protection devices, and their associated connectivity. We introduce the concept of a device visibility path and use a small Prolog application to calculate a device vulnerability level for a target device within a hypothetical power substation. Our model sets the basis for a prototype expert system capable of answer questions about EPMS and SCADA systems such as: “Which is the most vulnerable device of our power substation under an attack scenario?” and “Why is this device highly vulnerable?” Although our focus and examples center on electric power control systems, our work has application in all real-time complex control systems, especially those found within critical infrastructures supporting today’s modern digital societies.
منابع مشابه
An Effective Attack-Resilient Kalman Filter-Based Approach for Dynamic State Estimation of Synchronous Machine
Kalman filtering has been widely considered for dynamic state estimation in smart grids. Despite its unique merits, the Kalman Filter (KF)-based dynamic state estimation can be undesirably influenced by cyber adversarial attacks that can potentially be launched against the communication links in the Cyber-Physical System (CPS). To enhance the security of KF-based state estimation, in this paper...
متن کاملA Methodology for Unified Assessment of Physical and Geographical Dependencies of Wide Area Measurement Systems in Smart Grids
Wide Area Measurement Systems (WAMS) enable real time monitoring and control of smart grids by combining digital measurement devices, communication and control systems. As WAMS consist of various infrastructures, they imply complex dependencies among their underlying systems and components of different types, such as cyber, physical and geographical dependencies. Although several works exist in...
متن کاملModeling and Designing Network Defense against Control Channel Jamming Attacks: A Passivity-Based Approach
Cyber-physical systems rely on distributed embedded wireless nodes for sensing, computation, and control, often leaving them vulnerable to intelligent attacks. Detecting and mitigating such attacks in a resource-efficient manner requires the network to identify the components under attack and adapt its response based on the observed network performance and attack impact. In this paper, we prese...
متن کاملModeling and Vulnerability Analysis of Cyber-Physical Power Systems Considering Network Topology and Power Flow Properties
Conventional power systems are developing into cyber-physical power systems (CPPS) with wide applications of communication, computer and control technologies. However, multiple practical cases show that the failure of cyber layers is a major factor leading to blackouts. Therefore, it is necessary to discuss the cascading failure process considering cyber layer failures and analyze the vulnerabi...
متن کاملAccessible Remote Testbed for Cyber-Physical Systems Security of the Smart Grid
With growing concerns for cyber security of critical infrastructures like the power grid, Cyber-Physical Systems (CPS) security testbeds are essential in providing controlled testing environments for evaluating and validating novel CPS security tools and technologies, thereby accelerating the transition of research to industrial practice. The engineering of such testbeds requires significant in...
متن کامل